Re: [Congress] CONGRESS is about ready to go
Bob Briscoe <ietf@bobbriscoe.net> Tue, 28 February 2023 08:11 UTC
Return-Path: <ietf@bobbriscoe.net>
X-Original-To: congress@ietfa.amsl.com
Delivered-To: congress@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CED83C151541 for <congress@ietfa.amsl.com>; Tue, 28 Feb 2023 00:11:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=bobbriscoe.net
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pIwOUNWHjnhx for <congress@ietfa.amsl.com>; Tue, 28 Feb 2023 00:11:25 -0800 (PST)
Received: from mail-ssdrsserver2.hostinginterface.eu (mail-ssdrsserver2.hostinginterface.eu [185.185.85.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7355C14CF1D for <congress@ietf.org>; Tue, 28 Feb 2023 00:11:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=bobbriscoe.net; s=default; h=Content-Transfer-Encoding:Content-Type: In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date:Message-ID:Sender :Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help: List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=LIKWX7SEKspBby+CRipzRuAFcW4FltWAnoeKPnI6QJY=; b=s6BBAet6h0F7OwtW3nLWJlpToD EUg7haqNIxqdRcDhhzviEAVCe5Dna5E9qXrcNg1CMIefsPBRHqIiM6+/tf83D0694xcehKRLO5Mt4 E/r4Xo76vHqZlP7S8LwUanw/BI3T+3X3zWAaKPcMTG3ZVqHOZWba0CdfI3m06JhK2SRUBbuDHhpz8 +cGHw48Vt5+s0BB8X0DNt4DDjes/NLSf5JY9myf0v61XtC69W3JXeVMlszxGlXbbWv9BTwjIczFlQ JD9GGNbErFN5Sn5mYquBxgW8+dg2Sr2Yf+XQuD34/6MTSmp7ylFzlYN7iqfWHpmjSLfnbqczZPuNU 3lJ+x4tQ==;
Received: from 67.153.238.178.in-addr.arpa ([178.238.153.67]:39414 helo=[192.168.1.8]) by ssdrsserver2.hostinginterface.eu with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.95) (envelope-from <ietf@bobbriscoe.net>) id 1pWv52-001AfM-H2; Tue, 28 Feb 2023 08:11:20 +0000
Message-ID: <0a4a6f97-cef5-d742-d9e0-2afb40db97f6@bobbriscoe.net>
Date: Tue, 28 Feb 2023 08:11:19 +0000
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1
Content-Language: en-GB
To: Christian Huitema <huitema@huitema.net>, Matt Mathis <mattmathis@measurementlab.net>, Martin Duke <martin.h.duke@gmail.com>
Cc: "congress@ietf.org" <congress@ietf.org>
References: <CAM4esxQwvo-QNiq_1PDx_z8RvxcJwrMdkb+GJLYJDYw6+_gO2g@mail.gmail.com> <71579EDF-5910-49E4-A76E-3291A133A533@gmail.com> <CAEsRLK_v50CjouSRga2_DQDXOi0rFUVHUGEtL9UJMt+UtnRAiA@mail.gmail.com> <f257f6db-c3c1-3ba4-b99f-cf141c0d90d5@bobbriscoe.net> <CAEsRLK_kdQPa=J3hktfPJ5z5GsFMFAMvDo=x9x-E9K-DmrXk-g@mail.gmail.com> <dac96aaf-f122-45b7-f1b3-aa6e01a3daaf@bobbriscoe.net> <CAEsRLK8CEiPZLW_4d3LmkQhOH0tkdMSkwXipW_K16qWG_66szA@mail.gmail.com> <2a140a2e-6718-f916-3409-9d9609ff7fd2@huitema.net> <9E543709-8879-4B88-81CA-38EEA17C5045@ericsson.com> <CAEsRLK9otD6ZG98o-qwOESF99F_3wn7eqJwXBcJWxekkMsdjgg@mail.gmail.com> <2D200F56-0053-4FB9-B446-BAEC2D518581@ericsson.com> <CAEsRLK8GoAv=mvxzpeyfKX01EeUQMLiPkkkAO=w89PAKmB_rPQ@mail.gmail.com> <CAEsRLK_kZhg68n0E5mGVm_JY+qsw_WaotjLMQebt8g4Du41TmA@mail.gmail.com> <CAM4esxTgFZJct=C5BGbXn0U=9UNnNsa3kV4dJtkk-pGttT8cmw@mail.gmail.com> <CAEsRLK8WN4yHXTSVQ18hVzj08-wkAespHq8zumXH0USO1LEuog@mail.gmail.com> <bdf296ac-e727-d8e5-d604-26d92a627ece@huitema.net>
From: Bob Briscoe <ietf@bobbriscoe.net>
In-Reply-To: <bdf296ac-e727-d8e5-d604-26d92a627ece@huitema.net>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - ssdrsserver2.hostinginterface.eu
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - bobbriscoe.net
X-Get-Message-Sender-Via: ssdrsserver2.hostinginterface.eu: authenticated_id: in@bobbriscoe.net
X-Authenticated-Sender: ssdrsserver2.hostinginterface.eu: in@bobbriscoe.net
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/congress/e3tznfJ4m4YqEb6Z-meaPm3oGbw>
Subject: Re: [Congress] CONGRESS is about ready to go
X-BeenThere: congress@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussions about the CONGestion RESponse and Signaling \(CONGRESS\) Working Group" <congress.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/congress>, <mailto:congress-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/congress/>
List-Post: <mailto:congress@ietf.org>
List-Help: <mailto:congress-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/congress>, <mailto:congress-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Feb 2023 08:11:29 -0000
+1 on all 4 paras of Christian's email. To address the Diminishing Feedback problem when trying to get up to speed, you need /less/ ACK thinning. {Note 1} However, once up to speed, /more/ ACK thinning is needed in cases where the reverse path is the bottleneck. So the Diminishing Feedback problem and the ACK thinning problem are not the same problem. Bob {Note 1}: * A Linux TCP receiver includes a heuristic to disable delayed ACK every 2 packets (quick-ACK) until it detects the end of slow-start. * To improve on this, we were sending packets with variable inter-packet intervals to detect the onset of queuing delay without growing a persistent queue. * This confused the Linux receiver's heuristic. But we got much better results in tests where we manually disabled delayed ACK every 2 packets on the receiver. * That experience told me that a receiver heuristic that assumes the sender is using slow-start has ossified the slow-start algorithm into Linux TCP. * This motivated me to push for a protocol option so the sender can ask the receiver to alter its ACK rate - in the tcpm and quic WGs - which Christian points to. On 28/02/2023 04:29, Christian Huitema wrote: > Matt, > > It is not obvious to me that the "diminishing Feedback" problem > studied by Welzl & al. is related to ACK thinning. Succinctly, they > are arguing that a majority of flows are too short lived to be able to > measure network bandwidth using end to end mechanism, that this leads > to under-using the network capacity, that the problem is not amenable > to end to end solutions, and that any solution will have to involve > signalling by the network to the transport. I don't see any direct > relation between that line of reasoning and a discussion of whether we > should send one ACK per RTT, or 4, or one ACK for 2 packets. > > The discussion of ACK thinning is well advanced in the QUIC WG, see: > https://www.ietf.org/archive/id/draft-ietf-quic-ack-frequency-02.html. > (The authors have left the draft expire, but this is very much an > active discussion.) The draft is already implemented and deployed in > multiple QUIC stacks -- typically aiming for 4 ACKs per RTT, but the > actual draft does not say that. > > We may discuss whether such mechanisms should be developed in > Congress, or whether they belong in the respective transport groups. > They impact multiple mechanisms -- the QUIC draft mentions congestion > control, burst mitigation, lost detection and connection migration. > Congress could certainly provide guidelines on the impact of delayed > ACKs (or ACK thinning) on congestion control, and probably also for > burst control. But issues like loss detection or connection migration > are probably better dealt with in the specific transport group. > > I think we need some reasonable boundaries between Congress and > transport specific groups like TCPM or QUIC. > > -- Christian Huitema > > On 2/27/2023 4:59 PM, Matt Mathis wrote: >> Yes, technically ACK thinning is a TCP only issue. However the >> diminishing feedback problem [1] strikes all protocols, and >> implicitly defines the limits of desirable properties such as >> freedom from starvation and any form of fairness. ACK decimation >> makes the problem much worse, and somebody in the transport area >> needs to give advice to link designers to put limits on ACK >> thinning. We can decide that tcpm is the right place for such a >> document, however doing it there will separate the discussion about >> TCP from any broader conversation in congress about the general >> problem of diminishing feedback. >> >> (BTW, although I agree with the problem statement, I don't agree with >> their conclusion) >> [1] Future Internet Congestion Control: The Diminishing Feedback Problem >> Michael Welzl, Peyman Teymoori, Safiqul Islam, David Hutchison, Stein >> Gjessing >> https://arxiv.org/abs/2206.06642 <https://arxiv.org/abs/2206.06642> >> >> On Sun, Feb 26, 2023 at 1:30 PM Martin Duke <martin.h.duke@gmail.com >> <mailto:martin.h.duke@gmail.com>> wrote: >> >> I'm comfortable with adding these two bullets as being in-scope: >> >> - Congestion control techniques that address lower-layer alterations >> to packet timing or ordering. >> >> - Advice to upper layers on counterproductive behaviors regarding >> retransmissions and opening of additional connections to the same >> host. >> >> As for ACK thinning, this strikes me as a TCP-only problem, and a >> standalone solution should probably be done in TCPM. That isn't to >> say that a more comprehensive algorithm couldn't touch on these >> issues as part of their design, which wouldn't require a separate >> charter bullet. >> >> I'm happy to create a PR for this on Monday, when I have a decent >> text editor and github client. But I'm happy to entertain feedback. >> >> >> >> On Fri, Feb 24, 2023 at 2:45 PM Matt Mathis >> <mattmathis@measurementlab.net >> <mailto:mattmathis@measurementlab.net>> wrote: >> >> I just realized that the charter I have is .txt only. Did I >> overlook one in kramdown? >> >> On Fri, Feb 24, 2023 at 11:30 AM Matt Mathis >> <mattmathis@measurementlab.net >> <mailto:mattmathis@measurementlab.net>> wrote: >> >> You can't weigh fuzzy preferences in email, because the >> effort to send a message exceeds the strength of most >> people's opinion. >> >> I think the chairs (+ ADs?) just need to make a decision. >> I have some meetings but I will push two separate PRs laer >> today. >> >> On Fri, Feb 24, 2023 at 10:31 AM Zaheduzzaman Sarker >> <zaheduzzaman.sarker@ericsson.com >> <mailto:zaheduzzaman.sarker@ericsson.com>> wrote: >> >> yes, a PR would be good. >> >> However, I am not sure we have a conclusive discussion >> here that shows what it actually means if we include >> those two bullets. I would like to understand that part >> better. >> >> Let me remind us that right now the charter includes >> "operational guidance" in the charter, is that not good >> enough? >> >> //Zahed >> >>> On 24 Feb 2023, at 15:49, Matt Mathis >>> <mattmathis@measurementlab.net >>> <mailto:mattmathis@measurementlab.net>> wrote: >>> >>> I submitted two bullets that could go directly into >>> the charter. Would you like a PR? >>> >>> Although it is reasonable to assume that we have views >>> up and down the stack, I hoped to make them explicit >>> for two reasons: >>> 1) We tend to forget to think about some of these >>> things, and I was hoping to have >>> permanent reminders. (For example, how much has L4s >>> and TCP Prague been >>> tested on networks that require batching, such as 600 >>> Mb/s WiFi? I have yet to see any mention of potential >>> problems (Please let me know if I have missed >>> something). >>> 2) I have seen good ideas ruled "out of scope" because >>> they were not explicitly in scope, and raised an >>> awkward truth that the WG didn't want to address. >>> >>> Of my two points, I see more risk down the stack. >>> >>> On Fri, Feb 24, 2023 at 2:55 AM Zaheduzzaman Sarker >>> <zaheduzzaman.sarker@ericsson.com >>> <mailto:zaheduzzaman.sarker@ericsson.com>> wrote: >>> >>> First a question, Have we reached to any >>> actionable modification to the charter text after >>> the discussion here? >>> >>> On my personal view, I think the relation to lower >>> layer and upper layer is always there. We have >>> applications that produces and consumes data not >>> really focusing on how a transport protocol would >>> behave or require rather focused on their own KPIs >>> or goal. We also have lower layer which try to do >>> optimization - say ordered delivery, which perhaps >>> transport protocol can handle themself. For me, >>> all these are very good topics to discuss and >>> consider while designing on congestion control >>> algorithms , but does not need to be in the >>> charter. I am not sure what else can be done other >>> than publishing BCP or guidance. The 5033bis >>> perhaps would also trigger some of these >>> discussions. >>> >>> //Zahed >>> >>> > On 24 Feb 2023, at 04:23, Christian Huitema >>> <huitema@huitema.net <mailto:huitema@huitema.net>> >>> wrote: >>> > >>> > >>> > >>> > On 2/23/2023 5:14 PM, Matt Mathis wrote: >>> >> I should have used a different word. I meant >>> tools in a BCP standards sense - a citable >>> document that can be used to scold developers and >>> corporations who carelessly deploy large scale >>> systems that are capable of serving enough data to >>> DDOS entire countries. I have heard rumors of at >>> least 3 such events. >>> >> It would be better if we told application >>> designers that they MUST do their part to prevent >>> congestion collapse and that transport can't fix >>> some design flaws. >>> > >>> > Of course, we have no protocol police. For >>> example, nobody asked permission from the IETF to >>> deploy Cubic and make the buffer-bloat issue even >>> bigger than it was with Reno. Nobody asked for >>> permission from the IETF before deciding that >>> running 6 TCP connections in parallel was a fine >>> way to speed up the loading of web pages. >>> > >>> > In theory, we could encourage "enforcement by >>> network effects". For example, servers could >>> (perhaps) detect that a peer is requesting way too >>> many TCP connections in parallel, or stopping and >>> resuming its QUIC connections too frequently, and >>> "do something about it". Or, Active Queue Managers >>> in the network might detect that a particular flow >>> is causing congestion or long queues at the >>> bottleneck and "do something about it". >>> > >>> > That's something worth thinking about. A BCP >>> might detail the kind of enforcement that is >>> considered legit, providing servers admin or AQM >>> system with some kind of guidelines. And then, the >>> resulting enforcement might make the Internet >>> better for everybody. Maybe. >>> > >>> > It is also a clear recipe for ossification. >>> That, and the possibility of getting it wrong, >>> make writing any such recommendation rather >>> dangerous. Not that this has ever stopped the >>> deployment of middle boxes... >>> > >>> > -- Christian Huitema >>> > >>> > -- >>> > Congress mailing list >>> > Congress@ietf.org <mailto:Congress@ietf.org> >>> > https://www.ietf.org/mailman/listinfo/congress >>> <https://www.ietf.org/mailman/listinfo/congress> >>> >>> >>> >>> -- Thanks, >>> --MM-- >>> Evil is defined by mortals who think they know "The >>> Truth" and use force to apply it to others. >> >> >> >> -- Thanks, >> --MM-- >> Evil is defined by mortals who think they know "The Truth" >> and use force to apply it to others. >> >> >> >> -- Thanks, >> --MM-- >> Evil is defined by mortals who think they know "The Truth" and >> use force to apply it to others. >> >> >> >> -- >> Thanks, >> --MM-- >> Evil is defined by mortals who think they know "The Truth" and use >> force to apply it to others. >> > -- ________________________________________________________________ Bob Briscoe http://bobbriscoe.net/
- [Congress] CONGRESS is about ready to go Martin Duke
- Re: [Congress] CONGRESS is about ready to go Jeff Tantsura
- Re: [Congress] CONGRESS is about ready to go Matt Mathis
- Re: [Congress] CONGRESS is about ready to go Bob Briscoe
- Re: [Congress] CONGRESS is about ready to go Matt Mathis
- Re: [Congress] CONGRESS is about ready to go Bob Briscoe
- Re: [Congress] CONGRESS is about ready to go Matt Mathis
- Re: [Congress] CONGRESS is about ready to go Christian Huitema
- Re: [Congress] CONGRESS is about ready to go Zaheduzzaman Sarker
- Re: [Congress] CONGRESS is about ready to go Matt Mathis
- Re: [Congress] CONGRESS is about ready to go Zaheduzzaman Sarker
- Re: [Congress] CONGRESS is about ready to go Matt Mathis
- Re: [Congress] CONGRESS is about ready to go Matt Mathis
- Re: [Congress] CONGRESS is about ready to go Martin Duke
- Re: [Congress] CONGRESS is about ready to go Matt Mathis
- Re: [Congress] CONGRESS is about ready to go Christian Huitema
- Re: [Congress] CONGRESS is about ready to go Bob Briscoe
- Re: [Congress] CONGRESS is about ready to go Michael Welzl
- Re: [Congress] CONGRESS is about ready to go Michael Welzl
- Re: [Congress] CONGRESS is about ready to go Martin Duke
- Re: [Congress] CONGRESS is about ready to go Rodney W. Grimes
- Re: [Congress] CONGRESS is about ready to go Martin Duke
- Re: [Congress] CONGRESS is about ready to go Matt Mathis